نتایج جستجو برای: buffering technique

تعداد نتایج: 618922  

1998
Kenneth Mackenzie John Kubiatowicz Matthew I. Frank Walter Lee Victor Lee Anant Agarwal M. Frans Kaashoek

We propose and evaluate two complementary techniques to protect and virtualize a tightly-coupled network interface in a multicomputer. The techniques allow efficient, direct application access to network hardware in a multiprogrammed environment while gaining most of the benefits of a memory-basednetwork interface. First, two-case delivery allows an application to receive a message directly fro...

2005
Kohei Suenaga Naoki Kobayashi Akinori Yonezawa

In our previous paper, we have proposed a framework for automatically translating tree-processing programs into stream-processing programs. However, in writing programs that require buffering of input data, a user has to explicitly use buffering primitives which copy data from input stream to memory or copy constructed trees from memory to an output stream. Such explicit insertion of buffering ...

Journal: :Biochemistry. Biokhimiia 2000
H Abe

The intracellular non-bicarbonate buffering capacity of vertebrate muscle is mainly supported by the imidazole groups of histidine residues in proteins, free L-histidine in some fish species, and histidine-containing dipeptides such as carnosine, anserine, and balenine (ophidine). The proton buffering capacity markedly differs between muscle types and animal species depending on the ability for...

Journal: :Circulation 2003
Pamela Parker Jones Demetra D Christou Jens Jordan Douglas R Seals

BACKGROUND Baroreflex buffering is an important mechanism in arterial blood pressure control. The effect of healthy (physiological) aging on tonic baroreflex buffering in humans is unknown. METHODS AND RESULTS Baroreflex buffering was determined in 27 young (aged 25+/-1 years) and 16 older (aged 65+/-1 years) healthy normotensive men by measuring the potentiation of the systolic blood pressur...

2017
Tim F E Paffen Abraham J P Teunissen Tom F A de Greef E W Meijer

A supramolecular system in which the concentration of a molecule is buffered over several orders of magnitude is presented. Molecular buffering is achieved as a result of competition in a ring-chain equilibrium of multivalent ureidopyrimidinone monomers and a monovalent naphthyridine molecule which acts as an end-capper. While we previously only considered divalent ureidopyrimidinone monomers w...

2002
Yunkai Zhou Harish Sethu

There is increasing evidence that multimedia traffic in a variety of networks including the Internet, exhibits properties of self-similarity such as long-range dependence and a high-degree of correlation between arrivals. The demands of self-similar traffic impose unique new requirements in switch design, especially as far as the buffering strategy is concerned. In this paper, we study buffer s...

2012
Bassam El-Eswed Rushdi I. Yousef

Phillipsite tuff samples from Jebal Aritayn (Jordan) was treated chemically by acid, base, and salt and thermally at 200 and 400 oC. Both treated and untreated phillipsite samples were titrated with HCl and NaOH. The potentiometric titration curves showed that Jordanian phillipsite tuff exists in the base form (pH 8.5) and thus has a remarkable buffering capacity toward H. The effect of chemica...

Journal: :Comput. J. 1993
Srinivas Ramanathan P. Venkat Rangan

Future advances in networking and storage will make it feasible to build multimedia on-demand servers that provide services similar to those of a neighborhood videotape rental store over metropolitan area networks such as B-ISDN. Such multimedia servers can support real-time retrieval of multimedia objects by users onto their ISDN videophones and audiophones for playback. The design of techniqu...

Journal: :Computer Networks 2010
Jaideep D. Padhye Kush Kothari Madhu Venkateshaiah Matthew K. Wright

Network-based intrusions have become a serious threat to the users of the Internet. To help cover their tracks, attackers launch attacks from a series of previously compromised systems called stepping stones. Timing correlations on incoming and outgoing packets can lead to detection of the stepping stone and can be used to trace the attacker through each link. Prior work has sought to counter t...

2014
Xinrong Ma Douglas R. Stinson Ruizhong Wei

We consider an optimization problem motivated by the tradeoff between connectivity and resilience in key predistribution schemes (KPS) for sensor networks that are based on certain types of combinatorial designs. For a specific class of designs, we show that there is no real disadvantage in requiring the underlying design to be regular.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید